Abstract is missing.
- Decoding the Mystery of the Internet of ThingsJeffrey M. Voas. 1-2 [doi]
- Building Privacy-Preserving Cryptographic Credentials from Federated Online IdentitiesJohn Maheswaran, Daniel Jackowitz, Ennan Zhai, David Isaac Wolinsky, Bryan Ford. 3-13 [doi]
- Neuralyzer: Flexible Expiration Times for the Revocation of Online DataApostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper. 14-25 [doi]
- Differentially Private K-Means ClusteringDong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin. 26-37 [doi]
- HCFI: Hardware-enforced Control-Flow IntegrityNick Christoulakis, George Christou, Elias Athanasopoulos, Sotiris Ioannidis. 38-49 [doi]
- Remix: On-demand Live RandomizationYue Chen, Zhi Wang, David Whalley, Long Lu. 50-61 [doi]
- Derandomizing Kernel Address Space Layout for Memory Introspection and ForensicsYufei Gu, Zhiqiang Lin. 62-72 [doi]
- Patching Logic Vulnerabilities for Web Applications using LogicPatcherMaliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan. 73-84 [doi]
- Toward Large-Scale Vulnerability Discovery using Machine LearningGustavo Grieco, Guillermo Luis Grinblat, Lucas C. Uzal, Sanjay Rawat, Josselin Feist, Laurent Mounier. 85-96 [doi]
- To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing ExploitAwad A. Younis, Yashwant K. Malaiya, Charles Anderson, Indrajit Ray. 97-104 [doi]
- On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical AttacksValeriu Daniel Stanciu, Riccardo Spolaor, Mauro Conti, Cristiano Giuffrida. 105-112 [doi]
- On the Feasibility of Cryptography for a Wireless Insulin Pump SystemEduard Marin, Dave Singelée, Bohan Yang 0001, Ingrid Verbauwhede, Bart Preneel. 113-120 [doi]
- Multi Cloud IaaS with Domain Trust in OpenStackNavid Pustchi, Farhan Patwa, Ravi Sandhu. 121-123 [doi]
- SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality TraitsAnjila Tamrakar, Justin D. Russell, Irfan Ahmed, Golden G. Richard III, Carl F. Weems. 124-126 [doi]
- Privacy-Preserving Mining of Sequential Association Rules from Provenance WorkflowsMihai Maruseac, Gabriel Ghinita. 127-129 [doi]
- Risk-based Analysis of Business Process ExecutionsMahdi Alizadeh, Nicola Zannone. 130-132 [doi]
- Automatic Summarization of Privacy Policies using Ensemble LearningNoriko Tomuro, Steven L. Lytinen, Kurt Hornsburg. 133-135 [doi]
- An Authorization Service for Collaborative Situation AwarenessAlexandru Ionut Egner, Duc Luu, Jerry den Hartog, Nicola Zannone. 136-138 [doi]
- Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against ObfuscationJohannes Hoffmann, Teemu Rytilahti, Davide Maiorca, Marcel Winandy, Giorgio Giacinto, Thorsten Holz. 139-141 [doi]
- Scalable and Secure Logistic Regression via Homomorphic EncryptionYoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang. 142-144 [doi]
- AspectDroid: Android App Analysis SystemAisha Ali Gombe, Irfan Ahmed, Golden G. Richard III, Vassil Roussev. 145-147 [doi]
- On Energy Security of SmartphonesXing Gao, Dachuan Liu, Daiping Liu, Haining Wang. 148-150 [doi]
- DIVERSITYJohn Knight. 151 [doi]
- SMASheD: Sniffing and Manipulating Android Sensor DataManar Mohamed, Babins Shrestha, Nitesh Saxena. 152-159 [doi]
- On the Origin of Mobile Apps: Network Provenance for Android ApplicationsRyan Stevens, Jonathan Crussell, Hao Chen 0003. 160-171 [doi]
- Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus AppsZhenquan Cai, Roland H. C. Yap. 172-182 [doi]
- Novel Feature Extraction, Selection and Fusion for Effective Malware Family ClassificationMansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov, Giorgio Giacinto. 183-194 [doi]
- Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStackTaous Madi, Suryadipta Majumdar, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang. 195-206 [doi]
- Security Constraints in Temporal Role-Based Access-Controlled WorkflowsCarlo Combi, Luca Viganò, Matteo Zavatteri. 207-218 [doi]
- ARPPM: Administration in the RPPM ModelJason Crampton, James Sellwood. 219-230 [doi]
- Interoperability of Relationship- and Role-Based Access ControlSyed Zain R. Rizvi, Philip W. L. Fong. 231-242 [doi]
- A Model-driven Approach to Representing and Checking RBAC Contextual PoliciesAmeni ben Fadhel, Domenico Bianculli, Lionel C. Briand, Benjamin Hourte. 243-253 [doi]
- SDN Research Challenges and OpportunitiesAnita Nikolich. 254 [doi]
- Detecting Malicious Exploit Kits using Tree-based Similarity SearchesTeryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, Reiner Sailer. 255-266 [doi]
- PANDDE: Provenance-based ANomaly Detection of Data ExfiltrationDaren Fadolalkarim, Asmaa Sallam, Elisa Bertino. 267-276 [doi]
- Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination ForensicsGaoyao Xiao, Jun Wang, Peng Liu, Jiang Ming, Dinghao Wu. 277-284 [doi]
- TPRIVEXEC: Private Execution in Virtual MemoryJudicael Briand Djoko, Brandon Jennings, Adam J. Lee. 285-294 [doi]
- Hacking the DBMS to Prevent Injection AttacksIberia Medeiros, Miguel Beatriz, Nuno Ferreira Neves, Miguel Correia. 295-306 [doi]
- JSLINQ: Building Secure Applications across TiersMusard Balliu, Benjamin Liebe, Daniel Schoepe, Andrei Sabelfeld. 307-318 [doi]
- Efficient Network Path Verification for Policy-routedQueriesSushama Karumanchi, Jingwei Li, Anna Cinzia Squicciarini. 319-328 [doi]